Forget Rodeo Drive, Fifth Avenue, or Regent Street—Balogun Market in Lagos truly is the shopping metropolis of the world. Its crammed, umbrella-shielded corrugated metal stalls is abuzz with trades and transactions. Hundreds more shops, wholesalers, and cramped workshops fill the honeycombed concrete buildings that ring the market.
Balogun Market is in many ways a little world of Nigeria: a country known globally as a petro-economy, but one that in reality is a country of small business people. Nigeria’s entrepreneurs generally power Africa’s largest economy, generating almost 50% of its GDP and employing 60 million people—roughly 84% of its labor force.
Erica Grant bears the key to rectifying a security flaw that puts thousands of hotels – and their guests – at risk each year.
With as much enthusiasm for security as she has for quantum computing, Grant, 24, has unlocked a way to guard doors against tech-savvy intruders.
Her perception sets out to fix one big problem: It’s viable– easy, even – to get an old key card from a hotel and convert it into a master key that can access any room in the building, said Grant, a Virginia native now pursuing her doctorate through the Bredesen Center for Interdisciplinary Research and Graduate Education at the University of Tennessee.
Komodo is delighted to declare the incorporation of Dilithium, a quantum-secure digital signature scheme. This new technology yield protection against attacks from quantum computers, ensuring an unparalleled level of security.
While adopting a quantum-secure cryptographic signature scheme would normally be the only focus of an entire blockchain project— perhaps with its own coin, an ICO, and a dedicated team of developers— the power of Komodo’s technology allowed jl777 to complete the task in just a few days.
A new technique allows the quantum state of atomic “qubits”— the basic unit of data in quantum computers — to be measured with twenty times less error than was previously feasible, without losing any atoms. Precisely measuring qubit states, which are equivalent to the one or zero states of bits in traditional computing, is a vital step in the development of quantum computers.
We are working to develop a quantum computer that uses a three-dimensional array of laser-cooled and trapped cesium atoms as qubits,” said David Weiss, professor of physics at Penn State and the leader of the research team.
The great promise of quantum dissemination is perfect privacy: the ability to convey a message from one point in the universe to another in such a way that the very laws of physics prevent an wiretapper from listening in.
For hackers, that kind of promise is like a red flag to a bull. Since the first commercial quantum cryptography systems became available in the early 2000s, people have often attempted to bring them down—with significant success. The attacks have ruthlessly utilize imperfections in the equipment used to send quantum information.
Quantum computers promise an aggressive increase in power compared with today’s classical CMOS-based systems. This growth is of a magnitude that is difficult for the human mind to grasp. So there is real excitement that quantum computers will bring benefits that are not possible with today’s systems.
With such assurance, we are seeing the rise of quantum computing prophets who say that, in just a few years, these machines will have the power to change the world. And conversely, we’re seeing more quantum computing skeptics who say it will never happen.
Researchers from the University of Warwick claim to have formed a new quantum computer program that can identify leakage of information from the states of 0 and 1 to unwanted states.
According to the researchers, the new technology will give users the capacity to check the reliability of quantum processing and to establish that quantum computing machines are doing precisely what they are supposed to do.
In a March 20 rundown to the Information Security and Privacy Advisory Board, Matthew Scholl, Chief of the Computer Security Division at NIST, said the agency spent much of the past year assessing 69 algorithms for its Post Quantum Cryptography Standardization project, a 2016 project designed to guard the machines used by federal agencies today from the encryption-breaking tools of tomorrow.
The presented algorithms are all designed to work with current technology and equipment, each contribution in different ways to protect computers and data from attack vectors – known and unknown – posed by developments in quantum computing.
Questions from John Timmer, the Ars Technica Ruler of All Things Science, are sometimes unforeseen. If Slack could infuse letters with caution, a “Yes” would have dripped with it.
It turns out that D-Wave was loosing its quantum optimizer (the company had just announced a new version) on the world via an application programming interface (API). Ars was being invited to try it out, but one needed to know some Python.
Underneath the Franco-Swiss border, the Large Hadron Collider is sleeping. But it won’t be quiet for long.
Over the years to come, the world’s largest particle accelerator will be supercharged, increasing the number of proton collisions per second by a factor of two and a half.
Once the work is complete in 2026, researchers hope to unlock some of the most underlying questions in the universe. But with the increased power will come a flash flood of data the likes of which high-energy physics has never seen before. And, right now, humanity has no way of knowing what the collider might find.